IT Leadership Summit on Security — A Recap

Many thanks to IBM and COMMON for their recent IT Leadership Summit on Security, held August 3, 2022, at IBM’s Astor Place offices in New York City. This free, noncommercial event for IT executives featured speakers with broad experience addressing industry security concerns. Speakers included: Steve Sibley, Vice President, IBM Power Dawn May, COMMON President Bob Kalka, Vice President, IBM Security Business Unit Debbie Quick, Product Manager, IBM Power Security David Spurway, Global Principal IBM Power, IBM Technology Sales Westley McDuffie, Security Evangelist, IBM Security Carol Woodbury, President and CTO at DXR Security I was impressed by the unusual depth…

The post IT Leadership Summit on Security — A Recap appeared first on Seiden Group.

Configuring ACS (Access Client Solutions) to Use SSL (TLS)

The use of encrypted sessions is both an effective way to prevent credential theft, as well as a requirement for numerous laws and regulations.

In this session, security expert Amy Williams shows you how to configure the replacement for Client Access—Access Client Solutions—to use an encrypted (TLS) session.

This webinar will include an example of using your IBM i as a CA (Certificate Authority). You’ll also see an example of creating a request to send to a well-known CA to create the digital certificate you’ll need to assign to the servers to enable encrypted communications.

Verified by MonsterInsights